scholarly journals Safety Assistance Visual Surveillance Robot

There is a need for safety assistance visual surveillance that can be effectively used to navigate hazardous places which cannot be accessed by human beings. Several high-risk conditions like radioactive zone, toxic environment and accident-prone areas are usually approached/tackled by humans with little to no information about their conditions. Hence our aim is to reduce any human interaction with these unsafe circumstances by proposing a visual surveillance robot that is capable of moving in any terrain and can relay live information to the controller situated at a remote location. In this paper we address the implementation of Visual Surveillance bot by using a Camera that rotates at 360 degree with the help of DC motor, which illustrate the surrounding so as to provide the estimation of danger if any. We present the execution by efficiently live streaming information with the help of Raspberry pi and by using the MATLAB software to create a RADAR plot by analyzing the object detected by Ultrasonic sensor. The usage of MATLAB not only simplifies the analysis but also helps in creating an enhanced RADAR system by using an ARDUINO to support the ultrasonic system in recording the echo time and object detection angle.

Author(s):  
K. V. Usha Ramani

One of the crucial difficulties we aim to find in computer vision is to recognize items automatically without human interaction in a picture. Face detection may be seen as an issue when the face of human beings is detected in a picture. The initial step towards many face-related technologies, including face recognition or verification, is generally facial detection. Face detection however may be quite beneficial. A biometric identification system besides fingerprint and iris would likely be the most effective use of face recognition. The door lock system in this project consists of Raspberry Pi, camera module, relay module, power input and output, connected to a solenoid lock. It employs the two different facial recognition algorithms to detect the faces and train the model for recognition purpose


2021 ◽  
Vol 11 (7) ◽  
pp. 3153
Author(s):  
Saifeddine Benhadhria ◽  
Mohamed Mansouri ◽  
Ameni Benkhlifa ◽  
Imed Gharbi ◽  
Nadhem Jlili

Multirotor drones are widely used currently in several areas of life. Their suitable size and the tasks that they can perform are their main advantages. However, to the best of our knowledge, they must be controlled via remote control to fly from one point to another, and they can only be used for a specific mission (tracking, searching, computing, and so on). In this paper, we intend to present an autonomous UAV based on Raspberry Pi and Android. Android offers a wide range of applications for direct use by the UAV depending on the context of the assigned mission. The applications cover a large number of areas such as object identification, facial recognition, and counting objects such as panels, people, and so on. In addition, the proposed UAV calculates optimal trajectories, provides autonomous navigation without external control, detects obstacles, and ensures live streaming during the mission. Experiments are carried out to test the above-mentioned criteria.


2018 ◽  
Vol 7 (2) ◽  
pp. 61-67
Author(s):  
Iga Revva Princiss Jeinever

Computer networks are basically not safe to access freely. Security gaps in the network can be seen by irresponsible people with various techniques. Opening a port for access carries a high risk of being attacked by an attacker. In this connection, network administrators are required to work more to be able to secure the computer network they manage. One form of network security that is often used by network administrators in server management is through remote login such as ports on telnet, SSH, etc. A port that is always open is a network security hole that can be used by people who are not responsible for logging into the server. Focusing on these problems, in this study, Random Port Knocking is the right way and can be used to increase network security. With Random Port Knocking, the port will be opened as needed, the port will automatically change when it fails to log in more than three times and IP will automatically be blocked and access will not continue so that attacks on the network can be avoided and network security stability can be further improved. The final result of this research shows that the method applied in this research makes server safe. Because port randomization and IP block make irresponsible parties try harder to penetrate firewall walls.


2011 ◽  
Vol 6 (2) ◽  
Author(s):  
Hjördís Hákonardóttir

The paper focuses on equality as a primary principle of human interaction. Human beings have basic needs, physical and mental, the fulfilment of which is necessary for a flourishing life. These needs transfer into so-called fundamental rights. Humans are entitled to a life as conscious, autonomous actors in respect to those needs. In this respect all humans are equal. It is proposed here that equality in this sense promotes a situation from which fundamental rights are derived. Thus equality is primary to and the reason why recognition of fundamental rights cannot be left to the chance of social development.


2017 ◽  
Vol 5 (5) ◽  
pp. 320-325
Author(s):  
Ahmad T. Jaiad ◽  
Hamzah Sabr Ghayyib

Water is the most precious and valuable because it’s a basic need of all the human beings but, now a day water supply department are facing problem in real time operation this is because less amount of water in resources due to less rain fall. With increase in Population, urban residential areas have increased because of this reasons water has become a crucial problem which affects the problem of water distribution, interrupted water supply, water conservation, water consumption and also the water quality so, to overcome water supply related problems and make system efficient there is need of proper monitoring and controlling system. In this project, we are focusing on continuous and real time monitoring of water supply in IOT platform. Water supply with continuous monitoring makes a proper distribution so that, we can have a record of available amount of water in tanks, flow rate, abnormality in distribution line. Internet of things is nothing but the network of physical objects embedded with electronics, sensors, software, and network connectivity. Monitoring can be done from anywhere as central office. Using Adafruit as free sever data continuously pushed on cloud so we can see data in real time operation. Using different sensors with controller and raspberry pi as Mini computer can monitor data and also control operation from cloud with efficient client server communication.


2019 ◽  
pp. 117-120
Author(s):  
Stephanie Imelda Pella ◽  
Hendro FJ L

This research presents an automation process of controlling room temperature based on the number of people detected in a room. The system consists of a single board raspberry pi computer, esp8266 micro controller, pi camera, and an infrared module. This research is divided into two parts, namely object detection using Raspbery Pi and Tensorflow and Open CV libraries and controlling air cooling system (ACS) using esp8266 and infrared modules by transmitting hexadecimal AC control codes. The ACS temperature is divided into four levels with a minimum value at 18o C and a maximum at 24o C. System testings were carried out in an empty room and a room with a capacity of 50 people that is fully occupied. The results show that the system is able to detect the number of people in the room and control the ACS, but under certain conditions some objects are not detected because the position and camera tilt is not optimal.


Author(s):  
Mahesh Singh

This paper will help to bring out some amazing findings about autonomous prediction and performing action by establishing a connection between the real world with machine learning and Internet Of thing. The purpose of this research paper is to perform our machine to analyze different signs in the real world and act accordingly. We have explored and found detection of several features in our model which helped us to establish a better interaction of our model with the surroundings. Our algorithms give very optimized predictions performing the right action .Nowadays, autonomous vehicles are a great area of research where we can make it more optimized and more multi - performing .This paper contributes to a huge survey of varied object detection and feature extraction techniques. At the moment, there are loads of object classification and recognition techniques and algorithms found and developed around the world. TSD research is of great significance for improving road traffic safety. In recent years, CNN (Convolutional Neural Networks) have achieved great success in object detection tasks. It shows better accuracy or faster execution speed than traditional methods. However, the execution speed and the detection accuracy of the existing CNN methods cannot be obtained at the same time. What's more, the hardware requirements are also higher than before, resulting in a larger detection cost. In order to solve these problems, this paper proposes an improved algorithm based on convolutional model A classic robot which uses this algorithm which is installed through raspberry pi and performs dedicated action.


2013 ◽  
Vol 679 ◽  
pp. 107-111
Author(s):  
Abdul Waheed

The importance of UWB radar system for indoor applications is of keen interest. Applications such as across the wall monitoring, through wall detection, intrusion detection and under rubble vital sign detection are of cumulative interest and are also used in modern rescue systems to help the trapped human beings, along with detection and activity monitoring across the wall. In this paper we have studied across the wall detection of presence of different objects by applying the fractional Fourier transform. Computer aided design based simulations for indoor environment are accomplished by using finite difference time domain solution for Maxwell’s equations. Finally, fractal analysis is realized for the collected signals reflected from the objects present across the wall.


Sign in / Sign up

Export Citation Format

Share Document